{"id":57492,"date":"2026-04-24T11:13:12","date_gmt":"2026-04-24T01:13:12","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/"},"modified":"2026-04-24T11:22:14","modified_gmt":"2026-04-24T01:22:14","slug":"inc-ransom-australia-essential-8-ml2-no-longer-optional","status":"publish","type":"post","link":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/","title":{"rendered":"INC Ransom&#8217;s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional"},"content":{"rendered":"\n<p>Too many organisations still treat the Essential Eight as a maturity exercise they will get to later. That position is getting harder to defend.<\/p>\n\n\n\n<p>In March 2026, the Australian Cyber Security Centre published a joint advisory on INC Ransom and its affiliate network, warning that the group is actively targeting organisations across Australia, New Zealand and the Pacific. For Australian businesses, this is not another generic ransomware bulletin. It is a clear reminder that the gap between basic controls and operationally mature controls is where real damage now happens.<\/p>\n\n\n\n<p>For many mid-market organisations, Essential Eight Maturity Level Two is the point where cyber hygiene starts to become meaningful resistance rather than box-ticking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why This Advisory Matters<\/h2>\n\n\n\n<p>The ACSC advisory describes INC Ransom as a ransomware-as-a-service operation using affiliates to compromise organisations, steal data, encrypt systems and then pressure victims through double extortion. In other words, the attackers do not just want to disrupt systems. They want leverage.<\/p>\n\n\n\n<p>The Australian data in the advisory is specific enough to matter. Between 1 July 2024 and 31 December 2025, the ACSC responded to 11 reported INC Ransom-related incidents in Australia, with Professional Services and Health Care affected most heavily. Since January 2025, the ACSC has observed affiliates targeting Australian health care entities through compromised accounts, creating administrator-level accounts, moving laterally and exfiltrating personally identifiable and medical information.<\/p>\n\n\n\n<p>That attack pattern should feel familiar to every CIO and IT leader. It is not exotic tradecraft. It is a disciplined combination of credential abuse, weak remote access posture, privilege escalation, lateral movement and poor containment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Real Lesson Is Not Just &#8220;Patch Faster&#8221;<\/h2>\n\n\n\n<p>The ACSC notes that INC Ransom affiliates commonly gain initial access through spear-phishing, compromised credentials and exploitation of known vulnerabilities in unpatched internet-facing devices. They also use legitimate tools such as 7-Zip, WinRAR and rclone to compress and exfiltrate data.<\/p>\n\n\n\n<p>That matters because many organisations still think ransomware defence starts and ends with endpoint protection and backups. It does not. If attackers can sign in with valid accounts, bypass weak access controls, escalate privileges and use normal administration pathways, then a lot of downstream security tooling becomes reactive instead of preventative.<\/p>\n\n\n\n<p>This is exactly why the ACSC&#8217;s Essential Eight maturity model is useful. It does not ask whether an organisation has a control on paper. It asks whether the control is implemented at a level that matches how today&#8217;s attackers actually operate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Maturity Level Two Changes The Discussion<\/h2>\n\n\n\n<p>The ACSC describes Maturity Level Two as being focused on malicious actors who are willing to invest more time in a target, improve the effectiveness of their tools, actively target credentials through phishing and use technical and social engineering techniques to circumvent weak multi-factor authentication.<\/p>\n\n\n\n<p>That description maps closely to the INC Ransom campaign. This is the practical reason ML2 should now be the default target for many Australian organisations. It is the maturity level designed for adversaries who are no longer purely opportunistic but are still common enough to be a mainstream business risk.<\/p>\n\n\n\n<p>Maturity Level One is still valuable. But if the threat includes targeted phishing, credential abuse, weak MFA bypass, privilege misuse and ransomware operators looking for the fastest path to impact, ML1 often leaves too much room for the attack to succeed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The ML2 Controls That Matter Most Against INC Ransom<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing-Resistant MFA<\/h3>\n\n\n\n<p>This is one of the biggest shifts from &#8220;we have MFA&#8221; to &#8220;our MFA posture can withstand modern attacks&#8221;. At ML2, phishing-resistant MFA is required for users of online services and systems, and customers must be offered a phishing-resistant option for online customer services.<\/p>\n\n\n\n<p>That matters because the ACSC advisory explicitly highlights compromised accounts and the need to prioritise phishing-resistant MFA for remote access services, online services and privileged accounts. Push notifications and weak second factors are no longer enough in environments where attackers are deliberately targeting credentials.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Privileged Access Controls<\/h3>\n\n\n\n<p>The advisory observed INC Ransom affiliates creating new admin accounts and using privileged access to move laterally. ML2 responds directly to that problem.<\/p>\n\n\n\n<p>It requires dedicated privileged accounts, time-bound revalidation of privileged access, inactivity-based disabling of privileged access, separation of privileged and unprivileged environments, and stronger logging around privileged events. Those are not compliance details. They are the controls that stop a single compromised identity from becoming an environment-wide incident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Faster, Broader Vulnerability Management<\/h3>\n\n\n\n<p>The ACSC advisory points to unpatched internet-facing devices as a common initial access path. ML2 reinforces that reality by requiring regular vulnerability scanning, patching of critical or exploited online services within 48 hours, and structured patching across operating systems and a broader application estate.<\/p>\n\n\n\n<p>The practical difference is important. Many organisations patch their headline systems eventually. ML2 pushes them toward a repeatable program that finds exposed assets, prioritises exploitable weaknesses and closes the window attackers rely on.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Application Control And Hardening<\/h3>\n\n\n\n<p>INC Ransom affiliates rely on tooling, scripting and legitimate utilities to progress an intrusion. ML2 strengthens resistance by extending application control to internet-facing servers, applying Microsoft&#8217;s recommended blocklist, hardening browsers and Office, blocking risky child-process behaviour and improving PowerShell and command-line logging.<\/p>\n\n\n\n<p>Those measures do not eliminate every intrusion path, but they materially reduce an attacker&#8217;s ability to execute, persist and expand once access is gained.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Logging, Detection And Response Discipline<\/h3>\n\n\n\n<p>One of the less-discussed strengths of ML2 is that it is not just a prevention model. It also expects central logging, protection of logs from tampering, timely analysis of cyber security events and enactment of the incident response plan when an incident is identified.<\/p>\n\n\n\n<p>That aligns with the ACSC advisory&#8217;s detection guidance, which calls for centralised logs, monitoring of unauthorised remote access, and hunting for indicators of compromise linked to INC Ransom tactics. If an organisation cannot see privilege changes, remote access misuse, brute-force attempts or unusual internal scanning quickly, it will discover ransomware far too late.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Backup Resilience<\/h3>\n\n\n\n<p>Backups still matter, but only if attackers cannot reach them. ML2 strengthens backup integrity by preventing modification and deletion by unprivileged users and restricting backup access for privileged accounts other than backup administrators.<\/p>\n\n\n\n<p>That is a material step up for organisations that still rely on backup architectures that are too exposed to the same identities attackers compromise first.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Business Leaders Should Take From This<\/h2>\n\n\n\n<p>The key takeaway is not that every organisation must instantly jump to Maturity Level Three. It is that many Australian organisations are now operating against threat patterns that ML2 was specifically designed to address.<\/p>\n\n\n\n<p>If your environment still depends on weak MFA, broad admin access, patch cycles that lag behind public exploitation, limited server-side application control and incomplete security logging, then the issue is no longer theoretical maturity. It is operational exposure.<\/p>\n\n\n\n<p>Boards and executive teams should treat ML2 as a business resilience baseline for internet-connected enterprise environments, especially those handling sensitive customer, health, legal or financial information. The cost of remaining below that level is increasingly visible in real incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where To Start<\/h2>\n\n\n\n<p>For most mid-market organisations, the right next step is not to launch a massive transformation program. It is to identify which ML2 gaps would matter most during a real ransomware intrusion.<\/p>\n\n\n\n<p>That usually means starting with phishing-resistant MFA, privileged access separation, patching of internet-facing assets, backup protection, and central logging that can actually support rapid investigation.<\/p>\n\n\n\n<p>The organisations that respond best to campaigns like INC Ransom are usually not the ones with the biggest security stack. They are the ones that have made their baseline controls difficult to bypass.<\/p>\n\n\n\n<p>We help Australian organisations assess where their Essential Eight posture will hold up under current attack patterns and where it will not. If the latest ACSC advisory has raised questions about your path to ML2, our team can help you prioritise the controls that reduce risk fastest.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Too many organisations still treat the Essential Eight as a maturity exercise they will get to later. That position is getting harder to defend. In March 2026, the Australian Cyber Security Centre published a joint advisory on INC Ransom and its affiliate network, warning that the group is actively targeting organisations across Australia, New Zealand [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":57499,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"INC Ransom Australia","_yoast_wpseo_title":"INC Ransom Australia: Why Essential 8 ML2 Matters","_yoast_wpseo_metadesc":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","_yoast_wpseo_opengraph-title":"INC Ransom Australia: Why Essential 8 ML2 Matters","_yoast_wpseo_opengraph-description":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","_yoast_wpseo_twitter-title":"INC Ransom Australia: Why Essential 8 ML2 Matters","_yoast_wpseo_twitter-description":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,126],"tags":[],"class_list":["post-57492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyber-security-strategy-governance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>INC Ransom Australia: Why Essential 8 ML2 Matters<\/title>\n<meta name=\"description\" content=\"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"INC Ransom Australia: Why Essential 8 ML2 Matters\" \/>\n<meta property=\"og:description\" content=\"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-24T01:13:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T01:22:14+00:00\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"INC Ransom Australia: Why Essential 8 ML2 Matters\" \/>\n<meta name=\"twitter:description\" content=\"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"INC Ransom&#8217;s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional\",\"datePublished\":\"2026-04-24T01:13:12+00:00\",\"dateModified\":\"2026-04-24T01:22:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/\"},\"wordCount\":1297,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png\",\"articleSection\":[\"Blog\",\"Cyber Security Strategy &amp; Governance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/\",\"name\":\"INC Ransom Australia: Why Essential 8 ML2 Matters\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png\",\"datePublished\":\"2026-04-24T01:13:12+00:00\",\"dateModified\":\"2026-04-24T01:22:14+00:00\",\"description\":\"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/24\\\/inc-ransom-australia-essential-8-ml2-no-longer-optional\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"INC Ransom&#8217;s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"INC Ransom Australia: Why Essential 8 ML2 Matters","description":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/","og_locale":"en_US","og_type":"article","og_title":"INC Ransom Australia: Why Essential 8 ML2 Matters","og_description":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/","og_site_name":"CPI Consulting","article_published_time":"2026-04-24T01:13:12+00:00","article_modified_time":"2026-04-24T01:22:14+00:00","author":"CPI Staff","twitter_card":"summary_large_image","twitter_title":"INC Ransom Australia: Why Essential 8 ML2 Matters","twitter_description":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/"},"author":{"name":"CPI Staff","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"INC Ransom&#8217;s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional","datePublished":"2026-04-24T01:13:12+00:00","dateModified":"2026-04-24T01:22:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/"},"wordCount":1297,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png","articleSection":["Blog","Cyber Security Strategy &amp; Governance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/","name":"INC Ransom Australia: Why Essential 8 ML2 Matters","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png","datePublished":"2026-04-24T01:13:12+00:00","dateModified":"2026-04-24T01:22:14+00:00","description":"INC Ransom Australia activity is exposing weak MFA, patching and privilege controls. See why Essential 8 ML2 is now a practical baseline for Australian organisations.","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#primaryimage","url":"\/wp-content\/uploads\/2026\/04\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png","contentUrl":"\/wp-content\/uploads\/2026\/04\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/24\/inc-ransom-australia-essential-8-ml2-no-longer-optional\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"INC Ransom&#8217;s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudproinc.com.au\/#website","url":"https:\/\/www.cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/www.cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/www.cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2026\/04\/inc-ransom-australia-essential-8-ml2-no-longer-optional-cover.png","jetpack-related-posts":[{"id":57049,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/02\/18\/what-essential-8-compliance-actually-means-for-your-business\/","url_meta":{"origin":57492,"position":0},"title":"What Essential 8 Compliance Actually Means for Your Business","author":"CPI Staff","date":"February 18, 2026","format":false,"excerpt":"Essential 8 isn\u2019t a checkbox. It\u2019s a practical way to reduce ransomware risk, prove due diligence, and avoid expensive security \u201csurprises\u201d as your business grows.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-27.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-27.png 1x, \/wp-content\/uploads\/2026\/02\/post-27.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-27.png 2x, \/wp-content\/uploads\/2026\/02\/post-27.png 3x, \/wp-content\/uploads\/2026\/02\/post-27.png 4x"},"classes":[]},{"id":57472,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/21\/microsofts-emergency-windows-server-updates-are-a-reminder-mid-market-patch-validation-cannot-be-optional\/","url_meta":{"origin":57492,"position":1},"title":"Microsoft&#8217;s Emergency Windows Server Updates Are a Reminder Mid-Market Patch Validation Cannot Be Optional","author":"CPI Staff","date":"April 21, 2026","format":false,"excerpt":"Patch deployment failures are not supposed to become operational incidents. But that is exactly what many IT teams were forced to confront after Microsoft's April 2026 Windows Server security updates triggered installation failures on some Windows Server 2025 systems and restart loops on some domain controllers. For mid-market organisations, this\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/microsofts-emergency-windows-server-updates-mid-market-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/microsofts-emergency-windows-server-updates-mid-market-cover.png 1x, \/wp-content\/uploads\/2026\/04\/microsofts-emergency-windows-server-updates-mid-market-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/microsofts-emergency-windows-server-updates-mid-market-cover.png 2x, \/wp-content\/uploads\/2026\/04\/microsofts-emergency-windows-server-updates-mid-market-cover.png 3x, \/wp-content\/uploads\/2026\/04\/microsofts-emergency-windows-server-updates-mid-market-cover.png 4x"},"classes":[]},{"id":57288,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/03\/22\/what-microsoft-ai-foundry-means-for-australian-organisations-designing-enterprise-ai-platforms\/","url_meta":{"origin":57492,"position":2},"title":"What Microsoft AI Foundry Means for Australian Organisations Designing Enterprise AI Platforms","author":"CPI Staff","date":"March 22, 2026","format":false,"excerpt":"Most Australian organisations that started building AI capabilities in the last two years are hitting the same wall. The proof of concept worked. The board approved the next phase. And now IT teams are drowning in questions nobody planned for. Where do the models run? Who approves new deployments? How\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/microsoft-ai-foundry-australian-enterprise-ai-platforms-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/microsoft-ai-foundry-australian-enterprise-ai-platforms-cover.png 1x, \/wp-content\/uploads\/2026\/03\/microsoft-ai-foundry-australian-enterprise-ai-platforms-cover.png 1.5x, \/wp-content\/uploads\/2026\/03\/microsoft-ai-foundry-australian-enterprise-ai-platforms-cover.png 2x, \/wp-content\/uploads\/2026\/03\/microsoft-ai-foundry-australian-enterprise-ai-platforms-cover.png 3x, \/wp-content\/uploads\/2026\/03\/microsoft-ai-foundry-australian-enterprise-ai-platforms-cover.png 4x"},"classes":[]},{"id":57487,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/microsoft-teams-helpdesk-impersonation-attacks-are-rising-heres-what-australian-it-teams-should-change-this-week\/","url_meta":{"origin":57492,"position":3},"title":"Microsoft Teams Helpdesk Impersonation Attacks Are Rising. Here&#8217;s What Australian IT Teams Should Change This Week","author":"CPI Staff","date":"April 22, 2026","format":false,"excerpt":"A new wave of social engineering attacks is targeting Australian organisations through a channel most IT teams still treat as safe: Microsoft Teams. Threat actors are impersonating internal IT helpdesk staff, reaching users via external Teams chats and federated messaging, and walking them straight into credential theft or malware deployment.\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/microsoft-teams-helpdesk-impersonation-attacks-australian-it-teams-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/microsoft-teams-helpdesk-impersonation-attacks-australian-it-teams-cover.png 1x, \/wp-content\/uploads\/2026\/04\/microsoft-teams-helpdesk-impersonation-attacks-australian-it-teams-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/microsoft-teams-helpdesk-impersonation-attacks-australian-it-teams-cover.png 2x, \/wp-content\/uploads\/2026\/04\/microsoft-teams-helpdesk-impersonation-attacks-australian-it-teams-cover.png 3x, \/wp-content\/uploads\/2026\/04\/microsoft-teams-helpdesk-impersonation-attacks-australian-it-teams-cover.png 4x"},"classes":[]},{"id":57438,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/15\/project-glasswing-what-anthropics-100m-cybersecurity-initiative-means-for-enterprise-security-teams\/","url_meta":{"origin":57492,"position":4},"title":"Project Glasswing: What Anthropic&#8217;s $100M Cybersecurity Initiative Means for Enterprise Security Teams","author":"CPI Staff","date":"April 15, 2026","format":false,"excerpt":"On April 7, 2026, Anthropic announced Project Glasswing \u2014 a cybersecurity initiative that brings together AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks. Their shared mission: use frontier AI to find and fix vulnerabilities in the world's most critical software before attackers\u2026","rel":"","context":"In &quot;AI for Business &amp; AI Strategy&quot;","block_context":{"text":"AI for Business &amp; AI Strategy","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai-for-business-ai-strategy\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/project-glasswing-anthropic-100m-cybersecurity-enterprise-security-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/project-glasswing-anthropic-100m-cybersecurity-enterprise-security-cover.png 1x, \/wp-content\/uploads\/2026\/04\/project-glasswing-anthropic-100m-cybersecurity-enterprise-security-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/project-glasswing-anthropic-100m-cybersecurity-enterprise-security-cover.png 2x, \/wp-content\/uploads\/2026\/04\/project-glasswing-anthropic-100m-cybersecurity-enterprise-security-cover.png 3x, \/wp-content\/uploads\/2026\/04\/project-glasswing-anthropic-100m-cybersecurity-enterprise-security-cover.png 4x"},"classes":[]},{"id":57387,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/02\/the-axios-npm-compromise-exposed-a-serious-gap-in-enterprise-dependency-governance\/","url_meta":{"origin":57492,"position":5},"title":"The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance","author":"CPI Staff","date":"April 2, 2026","format":false,"excerpt":"Most organisations still treat dependency management as a developer hygiene issue. The Axios npm compromise shows that assumption is now dangerous. When two malicious Axios versions were published on March 31, 2026, the problem was not limited to a bad package update. According to Microsoft Threat Intelligence, axios@1.14.1 and axios@0.30.4\u2026","rel":"","context":"In &quot;Application Development&quot;","block_context":{"text":"Application Development","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/application-development\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/axios-npm-compromise-exposed-dependency-governance-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/axios-npm-compromise-exposed-dependency-governance-cover.png 1x, \/wp-content\/uploads\/2026\/04\/axios-npm-compromise-exposed-dependency-governance-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/axios-npm-compromise-exposed-dependency-governance-cover.png 2x, \/wp-content\/uploads\/2026\/04\/axios-npm-compromise-exposed-dependency-governance-cover.png 3x, \/wp-content\/uploads\/2026\/04\/axios-npm-compromise-exposed-dependency-governance-cover.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=57492"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57492\/revisions"}],"predecessor-version":[{"id":57493,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57492\/revisions\/57493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/57499"}],"wp:attachment":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=57492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=57492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=57492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}